What will be the major security risks in 2009? More importantly, what can you do to protect your PC against these risks?
Be forewarned: the answers are not quite what you expect.
If you’d like to know how it feels to be ignored by malware authors, add Ubuntu to your existing Windows installation.
A free utility makes creating a dual-boot Windows/Ubuntu machine fast, simple, and safe.
If you share a PC with someone at home or work, you have pretty good reasons for wanting to keep your Internet activities private.
Yes, it’s easy to cloak your surfing history from casual eavesdroppers, but hiding your browser tracks from determined, technically skilled users is actually quite challenging.
Using a Wi-Fi network in a coffee shop, airport, or hotel is such a serious security risk that I simply never do it without taking additional measures to protect my data and my PC.
These three techniques will keep you safe while using a public network, often without costing you anything but a small bit of time.
You can do your best to keep your children safe by using one of two top Internet access–control utilities.
My top choices for little kids and teens cover all the bases: protocol-level filtering, usage time limits, monitoring tools, and remote management.
When I last discussed backup, in my Sept. 18
I noted that backing up your PC appears to be a simple process on the surface, but in practice it’s often complex.
Well, folks, with the release of Acronis True Image Home 2009, backups just got a little simpler, though they’re still no walk in the park.
Most PC users have heard of the Windows Registry yet have no idea what it does.
This article presents in simple terms the purpose of the Registry, how it functions, and how to make basic changes that will optimize your PC’s performance.
The apps in OpenOffice.org 3 provide the same basic functionality as their Microsoft Office counterparts and offer many enhancements of their own.
Still, just because they’re free doesn’t mean they’re the best choice for everyone, particularly Office-centric organizations.
The free and fee-based versions of two easy-to-use utilities can take the pain out of troubleshooting and securing your home or small-office network.
You can control who’s on your network, find the source of connection problems, and share files and printers securely — even over the Internet.
Sandboxes are a relatively new type of security product that can significantly reduce your chance of getting infected when you surf or when you download and install programs.
I’ll explain why sandboxes are so important and show you how to use my favorite sandbox program.